MA-LTRT : A Novel Method to Improve Network Connectivity and Power Consumption in Mobile Adhoc based Cyber-Physical Systems

Size: px
Start display at page:

Download "MA-LTRT : A Novel Method to Improve Network Connectivity and Power Consumption in Mobile Adhoc based Cyber-Physical Systems"

Transcription

1 MA-LTRT : A Novel Method to Improve Network Connectivity and Power Consumption in Mobile Adhoc based Cyber-Physical Systems 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. Citation: Yuichi Kawamoto, Hiroki Nishiyama, and Nei Kato, "MA-LTRT : A Novel Method to Improve Network Connectivity and Power Consumption in Mobile Ad-hoc based Cyber-Physical Systems," IEEE Transactions on Emerging Topics in Computing (TETC), vol. 1, no. 2, pp , Dec URL:

2 1 MA-LTRT : A Novel Method to Improve Network Connectivity and Power Consumption in Mobile Ad-hoc based Cyber-Physical Systems Yuichi Kawamoto, Hiroki Nishiyama, and Nei Kato Graduate School of Information Sciences, Tohoku University, Sendai, Japan s: {youpsan, bigtree, and kato}@it.ecei.tohoku.ac.jp Abstract Recently, the development in wireless devices has made it possible to connect numerous devices by constructing networks only amongst themselves. Cyber-Physical Systems (CPSs) are likely to emerge through such network environments to connect both humans and machines so that a smart society can evolve with remarkably convenient and yet foreseen pervasive communication. However, it is difficult to establish adequate network infrastructures anywhere and anytime. Therefore, a critical research issue is to formulate an effective method for constructing networks. To address this issue, we focus on mobile ad-hoc based CPSs, which is a network system consisting of mobile devices. Since it does not require any specific facility, the mobile ad-hoc based CPS may be considered to be a good candidate for realizing next generation CPSs. However, it presents two major research challenges, namely the difficulty to maintain high connectivity in the network constructed by only mobile nodes, and the need to reduce the power consumption of the nodes. For addressing these two challenges in the mobile ad-hoc based CPS, we propose a novel method called Mobility Aware, Local Tree-based Reliable Topology to construct the network with adequate network connectivity while ensuring a low level of power consumption. Index Terms Cyber-Physical Systems (CPSs), Mobile Adhoc based CPS, power consumption, and network connections redundancy. I. INTRODUCTION In recent years, the concept of Cyber-Physical Systems (CPSs) has attracted a great deal of attention from researchers because they present an effective model to improve the interaction among different entities such as human-to-human, humanto-machine, and machine-to-machine communication [1]- [3]. The CPSs consist of networking equipment and machines such as sensors, smart phones, robots, and other wireless mobile devices [4]. Also, the vehicular CPS [5], [6] and ad-hoc based CPS [7] have emerged recently that exploit smart wireless devices. Researchers have shown that the utilization of both the cyber and physical components of a CPS can be improved in a synergistic manner by connecting these wireless devices with each other. The current trend also indicates that there is a wide spread of wireless devices, which also have mobility feature, to construct the CPSs. Therefore, it is essential to consider such CPS networks, which are often constructed by the ad-hoc connections amongst the mobile wireless devices. Hence, the focus of our paper is upon the mobile ad-hoc based CPSs. Fig. 1. Smart building system Medical system Environmental monitoring system Smart grid system Traffic control system An example of architecture of mobile ad-hoc based CPS Fig. 1 depicts an example architecture of a mobile ad-hoc based CPS. In the mobile ad-hoc based CPS, wireless mobile devices are connected with one another to construct temporary communication networks. Note that these temporary networks could be connected with a number of different systems such as smart grid system, traffic control system, environmental monitoring system, medical system, and smart building system. By connecting the systems and the temporary networks, it becomes possible to achieve a more efficient connectivity between cyber and physical components of a CPS. However, since the network resources of the devices (e.g., battery life and bandwidth) are limited, it may be difficult to connect all the concerned devices at the same time [8]. Also, the power consumption of each device is a critical issues [9]. Furthermore, the mobility of the devices leads to network performance degradation since it is impossible to keep the fixed state (i.e., the same topology) of the network [10]. Therefore, an effective technique to control the mobile ad-hoc network topology (of the considered CPS) is imperative. In the previously conducted research works, a number of topology control algorithms such as Local Minimum Spanning Tree (LMST) and Local Tree-based Reliable Topology (LTRT) were developed for Wireless Sensor Networks (WSNs). Although they exhibit certain advantages when used in fixed networks such as WSNs, their performance degrades substantially in scenarios involving moving nodes. This performance

3 2 degradation occurs due to the fact that the network might be disconnected even if only a single link is broken. For use in mobile ad-hoc networks, the research conducted in [11] and [12] added improvements to the original LTRT method. Indeed, the improved version of LTRT could provide reliable communication in the mobile ad-hoc networks to an extent as it preserves a certain level of redundancy of network connectivity. However, in order to ensure high connectivity, it may often need reconstruction of topology in the situation where the mobility of nodes in the network is significantly high, which causes high power consumption. Hence, an adequate method, to set the interval of topology reconstruction to decrease power consumption while keeping a certain level of network redundancy, becomes essential. Therefore, in our paper, we analyze the impact of the interval of topology control and network redundancy on power consumption in the mobile ad-hoc based CPS by using the improved LTRT. In our analysis, the existence of optimal topology control interval and network redundancy are confirmed, respectively. Moreover, we propose an algorithm to adequately set the above mentioned parameters of the topology control method. The remainder of this paper is organized as follows. The assumed network model and the way of topology control are introduced in Section II. In addition, the existing topology control methods and their shortcomings are presented in this section. Section III shows our proposed topology control method known as Mobility Aware LTRT (MA-LTRT). Additionally, some analyses on power consumption in mobile adhoc based CPS are also described in this section. In Section IV, we provide numerical results to verify the effectiveness of our proposed method. Finally, concluding remarks are presented in Section V. II. AN OVERVIEW OF TOPOLOGY CONTROL METHODS In this section, we introduce some of the topology control methods that exist in literature. In addition, we introduce the methodology of adopting an appropriate topology control for mobile ad-hoc networks based CPSs. Moreover, the shortcomings of these existing methods are delineated. A. Existing topology control methods and their shortcomings Topology control is a technique to reduce power consumption by removing redundant links and controlling the transmission range of each node in sensor or ad-hoc networks [13]- [16]. In the topology control method, at first, each node broadcasts a certain type of message called the Hello Message to neighboring nodes in its maximum transmission range. Each of the neighboring nodes, upon receiving the Hello Message, respond by returning the message including the node s information such as its position. Each node, after receiving these returned messages, decides the topology by using the neighbors positions and reduces the transmission range according to the position of the farthest node in the topology. By reducing the transmission range, it achieves reduction in the power consumption and avoids interference. In the past, many topology control schemes were proposed in literature that aimed at determining the topology of the underlying network. Examples of prominent topology control methods include Cone-Based distributed Topology Control (CBTC), LMST, LTRT and so forth. Here, we introduce these prominent topology control methods, and also describe their shortcomings in case of applying them to the mobile ad-hoc networks based CPS. CBTC is a topology control method which was developed by Li et al. [17]. In CBTC, each node sets its transmission range to connect its neighboring nodes, which are on the fan shaped area, having an angle of α [18]. In this method, each node can reduce its transmission range when the value of α is large because the probability that the neighboring node exists in the area increases with an increasing value of α. Additionally, it is proved that when α<5π/6, the network connectivity is ensured [19]. However, CBTC generates too many redundant links to construct the network topologies. As a consequence, this technique requires excessive power consumption. On the other hand, LMST is the topology control method based on tree structure [20], [21]. In LMST, each node constructs the topology, which is based on the MST (Minimum Spanning Tree) [22] with the information from only the neighboring nodes that are one hop away. Each node calculates the MST by using the information including their position information, and uses the MST to construct topology. Although the topology made by this method is not entirely a tree structure, the topology becomes similar to the MST since it includes MST as a subgraph. However, since the topology, which is constructed by LMST, is a directed graph, additional messages are required to formulate the non-directed graph. On the other hand, in LTRT [23], topologies are constructed based on LMST and Tree-based Reliable Topology (TRT) [24]. This method guarantees k-edge connectivity, i.e., the network connectivity cannot be lost if the number of broken links is smaller than k. Fig. 2 demonstrates an example whereby a node constructs a topology such that the redundancy of the topology is set to two in LTRT. In this method, the node broadcasts Hello message to all its neighboring nodes in its maximum transmission range that is the usual topology control. After that, by using the returned messages, the complete tree is constructed virtually. Fig. 2a shows the example of the complete tree constructed by six nodes. From the tree, the node chooses a first MST as shown in Fig. 2b, and stores the topology data at first. Secondly, the node chooses another MST from the tree such that the first MST is cut out from the complete tree. This is depicted in Fig. 2c. The second MST becomes totally different from the first one as described in Fig. 2d. In the case where the node constructs the topology having the redundancy equal to two, the links which were used in the first and the second MSTs, are utilized in the topology. Otherwise, the node repeats choosing different MSTs k times, and then decides the topology. After making the decision, the node adapts its transmission range to the furthest node in the topology. In this manner, the topology having the redundancy equal to k is constructed in LTRT. Since it is possible to control the value of k, it achieves an adequate tolerance to defection of nodes in the network. As mentioned above, each method has its respective ad-

4 3 (a) Complete tree (b) 1st MST able to keep the connection with C any more. Furthermore, the power consumption of the nodes is not taken into account much in [11]. In the mobile ad-hoc network based CPS, the nodes may be quite small-sized and not equipped with large enough battery. Thus, the power consumption is a critical parameter, which requires careful consideration. Therefore, we analyze the impact of these parameters (i.e., both redundant network connections and power consumption) on the topology control in mobile ad-hoc network based CPS and propose a method to set them adequately. III. ENVISIONED MOBILE AWARE LTRT (MA-LTRT) METHOD In this section, we propose a new topology control method called Mobile Aware LTRT (MA-LTRT) to improve the connectivity in mobile ad-hoc network based CPS by dynamically using the redundant transmission range. Additionally, we analyze the relationship between the power consumption and reconstruction interval of topology with some mathematical expressions, and minimize the power consumption in the proposed MA-LTRT method by controlling the reconstruction interval of the topology. In addition, we consider LTRT to be the base policy to construct topology in our proposal. (c) (a)-(b) (d) 2nd MST Rtra Fig. 2. (e) (b)+(d) (f) Set radius An example of proceeding to construct a topology in LTRT vantages. In particular, amongst the afore-mentioned methods, LTRT is considered as a good candidate to be utilized in the mobile ad-hoc based CPS, where each node moves randomly. The reason behind choosing LTRT for such a CPS is due to LTRT s ability to control redundancy (i.e., redundant network connectivity) adequately. Therefore, in the remainder of our paper, we focus on adapting LTRT to mobile ad-hoc networks by considering its redundancy. B. Adapting topology control methods to mobile ad-hoc network based CPS Since each node moves randomly in the mobile ad-hoc based CPS, the topologies need to have a certain level of redundancy to keep the connectivity. In [11], a method to dynamically change the value of k in LTRT to ensure high connectivity was proposed. In this method, each node chooses an appropriate value of k for each local graph based on local movements. As a result, it achieves a certain level of connectivity. However, since the topology reconstruction interval in the method is set to a constant value, the connectivity decreases dramatically when the average moving speed of nodes is high. For example, if the nodes near the edge of the transmission range of the center node C (which controls the topology) move in a direction away from C, they are not A. Dynamic utilization of the redundant transmission range In our proposed MA-LTRT, we aim at utilizing the redundant transmission range dynamically for topology control. As mentioned in the preceding section, the edge node of the transmission range of the center node which controls the topology results in the decrease of the connectivity in the mobile ad-hoc network based CPS. Thus, in this proposed MA-LTRT method, redundant transmission range is utilized to keep a certain level of redundancy of the topology. Fig. 3 demonstrates an example of the utilization of the redundant transmission range. Here, we define the maximum transmission range and the transmission range which is set by the basic LTRT as and R tra, respectively. In our proposal, we focus on moving of the center node which controls the topology and the edge node of the transmission range, and define the moving speed of these two nodes as v c and v e, respectively. To keep connectivity with the edge node at any time until the next reconstruction of the topology, the redundant transmission range is determined by considering the worst situation where the center and edge nodes move in the opposing directions. By considering the worst situation in determining the level of redundancy, the center node will be able to keep connection with the edge node regardless of the moving direction. Thus, we set the redundant transmission range, R red, with the topology reconstruction interval, Δt, as follows. R red = R tra +(v c + v e ) Δt. (1) By using the redundant transmission range, it is possible to keep the link between the center and edge nodes of the transmission range during the time of the topology reconstruction interval. Thus, it improves the reliability to maintain the topology. From Eq. 1, it is understood that R red is controlled by the value of Δt in this method because R tra, v c, and v e

5 4 message, d hello, as follows. P hello = n p d d hello. (2) R On the other hand, we define the average size of data which is sent during a topology reconstruction interval as d data. Thus, since the power consumption decreases with the fourth order of the transmission range, the power consumption to send data during the topology control reconstruction interval during the time, T, is expressed as follows. R new P data = n Δt p d d data { } 4 Rtra +(v c + v e ) Δt. (3) Fig. 3. Utilizing redundant transmission range. Therefore, the total power consumption, P total, which is defined as the sum of P hello and P data, is expressed as follows. P total = P hello + P data. (4) Additionally, the number of topology reconstruction during the time of T is expressed with the topology reconstruction interval and the time of T as follows. are decided by the placement and moving speed of each node. Thus, it is needed to determine the value of Δt to utilize an adequate value of R red. B. Dynamic utilization of the topology reconstruction interval In order to decide an adequate redundant transmission range, we focus on the relationship between the power consumption and topology reconstruction interval. If the interval is set to a small value, each node needs to broadcast the Hello Message quite frequently. Since the message is sent to the entire area covered by the maximum transmission range, the increase of number of times to send the message causes the increase of power consumption. On the other hand, from Eq. 1, a large value of Δt causes a large value of R red. If the value of the redundant transmission range is set to a large value, each node sends its data to longer distance than the case where the value of redundant transmission range is set to small. It also causes the increase of power consumption. Thus, there is a tradeoff relationship between the value of topology reconstruction interval and power consumption. To analyze the afore-mentioned tradeoff relationship, we formulate the amount of power which is consumed when each node broadcasts the Hello message and sends data during the topology reconstruction interval, respectively. Here, we consider the power consumed for a certain period of time to measure the power consumption, T. Additionally, we define the power consumption to broadcast the Hello message during the time, T,asP hello, and the power consumption to send data during the time, T,asP data. Thus, in the case where the topology reconstruction is executed n times during the time, T, P hello is formulated with the required power consumption to send a unit amount of data within the bound of maximum transmission range one time, p d, and the data size of the Hello n = T Δt. (5) Therefore, from Eqs. 2, 3, 4, and 5, the total power consumption may be expressed as follows. P total = p d d hello T Δt { } 4 Rtra +(v c + v e ) Δt + p d d data T. (6) From the right side of Eq. 6, it is understood that the first term decreases and the second term increases with the increase of the topology reconstruction interval. Thus, P total is considered to be a convex function of the interval. Therefore, there is an optimal number of the interval to minimize the power consumption. We define the optimal topology reconstruction interval as Δt opt. Δt, which minimizes the right side of Eq. 6, is obtained when the differentiated equation of the right side of Eq. 6 equals zero. Thus, it is obtained as Δt which satisfies the next equation. d dδt [ d hello + d data Δt { } ] 4 Rtra +(v c + v e ) Δt =0. (7) From Eq. 7, the optimal topology reconstruction interval to minimize the power consumption is expressed as follows. Δt opt =argminp total. (8) Δt Therefore, from Eqs. 6 and 8, the power consumption, when the proposed method is utilized, is calculated as follows. P opt = p d d hello T Δt opt { } 4 Rtra +(v c + v e )Δt opt + p d d data T. (9)

6 5 TABLE I A LIST OF NOTATIONS DEFINED AND USED IN OUR ANALYSIS. R red R tra v c v e Δt Δt opt P hello P data P total P opt P max p d n d hello d data T Radius of redundant transmission range which is set by proposed method Radius of transmission range which is set by LTRT Radius of maximum transmission range Moving speed of center node of its topology Moving speed of edge node of its topology Topology reconstruction interval Optimal value of topology reconstruction interval Power consumption to broadcast Hello message during the time T Power consumption to send data during the time T Total power consumption Optimal total power consumption Amount of energy consumption when all nodes utilize the maximum transmission range Power consumption to send unit amount of data within the bound of maximum transmission range Number of times to reconstruct topology during the time T Data size of Hello message Average size of data which is sent during a topology reconstruction interval Certain period of time to measure the power consumption Algorithm 1 Algorithm to adapt proposed method 1: loop 2: Calculate moving speed. 3: Broadcast Hello message to the maximum transmission range. 4: Construct topology using LTRT with a given value of k. 5: Calculate Δt opt by using Eq. 8. 6: Calculate redundant transmission range by using Eq. 1. 7: Set the transmission range to R red. 8: Keep the transmission range during the time equal to Δt opt. 9: end loop C. Algorithm to adapt the proposed MA-LTRT method In the remainder of this section, we introduce an algorithm to apply our proposed MA-LTRT method to decide the redundant transmission range of each node. Algorithm 1 shows a flow, using which a node constructs the network topology. In other words, each node uses this algorithm to construct the topology. In our algorithm, at first, each node sends the Hello message including its moving speed and the position to the neighboring nodes in the area of its maximum transmission range. This part is similar to the existing topology control method (refer to the basic LTRT). Secondly, after receiving the returned message including the information of the node such as the position and the moving speed from the neighbors, the topology based on LTRT is constructed according to the neighbors information with the given initial value of k. After that, the optimal topology reconstruction interval and the redundant transmission range are calculated by using Eqs. 8 and 1, respectively. Then, each node sets its transmission range to R red, and keeps the transmission range during the time equal to Δt opt. All the notations used in our analysis are summarized in Table I. IV. PERFORMANCE EVALUATION In this section, we verify the correctness of our analysis and evaluate the proposed method with numerical calculation. In this evaluation, we confirm the relationship between the energy consumption and the topology reconstruction interval and the change of the interval when the average moving speed of the nodes changes. Additionally, the energy expanded ratio is measured to confirm the effectiveness of the proposed method. Moreover, we show the change of the average number of surrounding nodes within one node s transmission range to confirm the effectiveness of our proposed method in reducing the interference. A. Parameter settings The parameter settings of our considered numerical calculation environment are summarized in Table II. In this evaluation, 100 nodes are placed uniformly in an area of 1000m 1000m and we set the certain period of time (to measure the power consumption) to 10,000s. Additionally, we

7 6 TABLE II PARAMETER SETTINGS Simulation area 1,000m 1,000m Number of nodes 100 Average transmission range Maximum transmission range Average moving speed Average size of data Data size of Hello message 125m 250m 12.5m/s 3kB 1kB suppose that the average transmission range set by the basic LTRT and the maximum transmission range of a given node are set to 50m and 250m, respectively. Moreover, to evaluate normalized value of power consumption, we set the power consumption required to send a unit amount of data as 1 and the average size of data which is sent during a topology reconstruction interval as 3kB. Also, the data size of the Hello message is set to 1kB. Note that in our proposed method, R red and Δt opt can be calculated regardless of the given value of k. They only depend on moving speed of nodes and the transmission range calculated after applying the basic LTRT algorithm. Therefore, in order to evaluate the performance of our proposed method, we only take into account the average moving speed of nodes and the given average transmission range calculated after applying the basic LTRT algorithm.. B. Numerical results At first, to confirm the correctness of our mathematical analysis, we evaluate the power consumption when the redundant transmission range is utilized by substituting some numerical values to Eq. 6. Fig. 4 demonstrates the change of the total power consumption when the topology reconstruction interval changes from 0s to 10s in the case where the average moving speed of nodes is different. From Fig. 4, it is understood that the total power consumption is a convex function of the topology reconstruction interval. Thus, we confirm that there is an optimal interval to minimize the power consumption. Secondly, we confirm the change of the optimal topology reconstruction interval by using Eq. 8. Fig. 5 represents the change of the optimal topology reconstruction interval when the average moving speed of the nodes vary from 0m/s to 25m/s, and the average size of data which are sent during a topology reconstruction interval is different. From the result, we can see that the topology reconstruction interval should be set to a shorter value to minimize the power consumption when the average moving speed of the nodes is higher. Moreover, when the average size of data which are sent during a topology reconstruction interval is large, the optimal topology reconstruction interval becomes short. Moreover, when the average size of data which are sent during a topology reconstruction interval is set to a significantly large value, the optimal value of the topology reconstruction interval becomes short. This is because that the required power consumption to increase the transmission range becomes large when the value Power consumption v = 5 [m/s] v = 10 [m/s] v = 15 [m/s] v = 20 [m/s] Topology reconstruction interval [s] Fig. 4. The change of power consumption when the value of topology reconstruction interval changes in each case where the average moving speed is different. Optimal topology reconstruction interval Average moving speed [m/s] Fig. 5. The change of optimal topology reconstruction interval when the average moving speed changes. of the average size of data which are sent during a topology reconstruction interval is set to large. Thirdly, we evaluate the energy expanded ratio to confirm the effectiveness of our proposed MA-LTRT method. The energy expanded ratio is calculated as the fraction of the power consumption in two cases. The first is the case where our MA-LTRT method is applied. The second is the case where all the nodes utilize the maximum transmission range to send their data. We define this amount of power consumption when the maximum transmission range is utilized as P max. Thus, the energy expanded ratio, denoted by EER, is expressed as follows. EER = P opt. (10) P max On the other hand, the amount of power consumption when the maximum transmission range is utilized is expressed below. P max = p d T (d hello + d data ). (11) Therefore, the enegy expanded ratio is calculated by using

8 7 EER MA-LTRT R red = 50 R red =100 R red = Average moving speed [m/s] Average number of surrounding nodes MA-LTRT R red = 50 R red =100 R red = Average moving speed [m/s] Fig. 6. The change in EER for different values of the average moving speed in case of the proposed MA-LTRT method and the basic LTRT method with different values of the redundant transmission range. Fig. 7. The change in the average number of surrounding nodes within one node s transmission range with the different values of the average moving speed in case of the proposed MA-LTRT method and the basic LTRT method with different values of the redundant transmission range. Eqs. 9, 10, and 11. [ 1 dhello EER = d hello + d data Δt opt { } ] 4 Rtra +(v c + v e ) Δt opt +d data. (12) Since P max represents the maximum power consumption, EER always takes the value of from 0 to 1. Additionally, the lower value of EER shows the effectiveness of the proposed MA-LTRT method. Fig. 6 demonstrates the change of the values of EER with the change of the average moving speed of the nodes while LTRT sets the transmission range to 50m, 100m, and 150m, respectively. From the obtained results, it is evident that the EER of our proposed MA-LTRT is always smaller than the other case where the redundant transmission range is different. It means that our MA-LTRT becomes successful in reducing the power consumption by setting an adequate transmission range. Finally, in order to confirm the effectiveness of our proposed method in reducing the interference, we show the change of the average number of surrounding nodes within one node s transmission range when the average moving speed changes. The large number of nodes surrounding one node implies that the node causes interference to many other nodes. From Fig. 7, it is understood that our proposed method achieves lower interference than the basic LTRT method when the redundant transmission range is set to 100m or 150m. Additionally, although the number of surrounding nodes within one node s transmission range becomes higher when the redundant transmission range of the basic LTRT is set to 50m and the average transmission range is high, the power consumption in the case of the basic LTRT becomes drastically high at that time as shown in Fig. 6. Therefore, it can be considered that the proposed method MA-LTRT achieves lower power consumption and interference. V. CONCLUSION A technique to provide network environment anytime and anywhere is required to realize the next generation CPSs. However, existing network infrastructures are not adequate to provide the necessary CPS network environment due to the limitation of place and cost to prepare the infrastructure. To overcome this challenge, in this paper, we focused on mobile ad-hoc network based CPS as a method to connect many kinds of wireless mobile devices for facilitating the next generation CPSs. Since the mobile ad-hoc network based CPS consists of only mobile devices, they can construct network environment without special facilities. However, to construct a reliable network with mobile nodes is difficult, and the power consumption of the nodes is essential issue in the mobile adhoc network based CPS. Therefore, we proposed a mobility aware LTRT (MA-LTRT) method to construct the network with a certain level of redundancy and low power consumption. In our proposal, each node sets the reconstruction interval of its topology dynamically to increase the connectivity and to reduce the power consumption. Additionally, by controlling the redundancy of the topology, it also achieves to prevent ineffectual increase of the power consumption while keeping high network connectivity. Moreover, the results obtained from our conducted numerical calculation demonstrated the effectiveness of our proposed MA-LTRT method in terms of significant improvement in the network connectivity and power consumption. REFERENCES [1] L. Shao-Yu, C. Shin-Ming, S. Sung-Yin, and C. Kwang-Cheng, Radio Resource Management for QoS Guarantees in Cyber-Physical Systems, Parallel and Distributed Systems, IEEE Transactions on, vol. 23, no. 9, pp , Sep [2] C. Xianghui, C. Peng, C. Jiming, S. Youxian, An Online Optimization Approach for Control and Communication Codesign in Networked Cyber-Physical Systems, Industrial Informatics, IEEE Transactions on, vol. 9, no. 1, pp , Feb [3] Q. Fengzhong, W. Fei-Yue, and Y. Liuqing, Intelligent transportation spaces: vehicles, traffic, communications, and beyond, Communications Magazine, IEEE, vol. 48, no. 11, pp , Nov

9 8 [4] L. Husheng, L. Lifeng Lai, and H. V. Poor, Multicast Routing for Decentralized Control of Cyber Physical Systems with an Application in Smart Grid, Selected Areas in Communications, IEEE Journal on, vol. 30, no. 6, pp , Jul [5] L. Xu, Q. Chunming, Y. Xuegang, A. Wagh, R. Sudhaakar, and S. Addepalli, Toward Effective Service Scheduling for Human Drivers in Vehicular Cyber-Physical Systems, Parallel and Distributed Systems, IEEE Transactions on, vol. 23, no. 9, pp , Sep [6] A. Miloslavov and M. Veeraraghavan, Sensor Data Fusion Algorithms for Vehicular Cyber-Physical Systems, Parallel and Distributed Systems, IEEE Transactions on, vol. 23, no. 9, pp , Sep [7] Li Xiaobo and Zhang Xu, The Design of Simulation Platform for Ad Hoc Based Cyber-Physical System, Mobile Ad-hoc and Sensor Networks (MSN), 2011 Seventh International Conference on, pp , Dec [8] L. Zhang, L. Cai, and J. Pan, Connectivity in Two-Dimensional Lattice Networks, IEEE Infocom 13, Turin, Italy, Apr [9] T. T. P. Luong, T. H. Nguyen, W. Jin, L. Sungyoung, and L. Young- Koo Energy Efficiency Based on Quality of Data for Cyber Physical Systems, Internet of Things (ithings/cpscom), 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing, pp , Oct [10] J. Fink, A. Ribeiro, and V. Kumar, Robust Control for Mobility and Wireless Communication in Cyber??Physical Systems With Application to Robot Teams, Proceedings of the IEEE, vol. 100, no. 1, pp , Jan [11] H. Nishiyama, T. Ngo, N. Ansari, and N. Kato, On Minimizing the Impact of Mobility on Topology Control in Mobile Ad Hoc Networks, IEEE Transactions on Wireless Communications, vol. 11, no. 3, pp , Mar [12] N. Thuan, H. Nishiyama, N. Ansari, and N. Kato, On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks, Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd, pp.1 5, Sep [13] Jie Wu and Fei Dai, Mobility-sensitive topology control in mobile ad hoc networks, Parallel and Distributed Systems, IEEE Transactions on, vol. 17, no. 6, pp , Jun [14] J. B. D. Cabrera, R. Ramanathan, C. Gutierrez, and R. K. Mehra, Stable Topology Control for Mobile Ad-Hoc Networks, Communications Letters, IEEE, vol. 11, no. 7, pp , Jul [15] G. Quansheng, F. R. Yu, J. Shengming, and W. Gang, Prediction- Based Topology Control and Routing in Cognitive Radio Mobile Ad Hoc Networks, Vehicular Technology, IEEE Transactions on, vol. 59, no. 9, pp , Nov [16] N. Li and J. C. Hou, Localized falut-tolerant topology control in wireless ad hoc networks, IEEE Transactions on Parallel and Distributed Systems, vol. 17, no. 4, pp , Apr [17] L. Li, J. Y. Halpern, P. Bahl, Y. Wang, and R. Wattenhofer, Analysis of a cone-based distributed topology control algorithm for wireless multihop networks, Proceedings of Twentieth ACM Symposium on Principles of Distributed Computing (PODC 2001), pp , Aug [18] R. Wattenhofer, L. Li, P. Bahl, and U. M. Wan, Distributed topology control for power efficient operation in multihop wireless ad hoc netwroks, Proceedings of Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies (INFO-COM 2001), vol. 3, pp , Apr [19] M. Bahramgirim, M. Hajiaghayi, and V. S. Mirrokni, Fault-tolerant and 3-dimensional distributed topology control algorithms in wireless multi-hop networks, Wireless Networks, pp , Mar [20] N. Li, J. Hou, C. Sha, and L. Sha, Design and analysis of an MST-based topology control algorithm, IEEE Transactions on Wireless Communications, vol. 4, no. 3, pp , May [21] X. Y. Li, Y. Wang, and W. Z. Song, Applications of k-local mst for topology control and broadcasting in wireless ad hoc networks, IEEE Transactions on Parallel and Distributed Systems, vol. 15, no. 12, pp , Dec [22] N. Li, J. C. Hou, and L. Sha, Design and analysis of an MSTbased topology control algorithm, in Proc. of IEEE INFOCOM, San Francisco, USA, Apr [23] K. Miyao, H. Nakayama, N. Ansari, and N. Kato, LTRT: An Efficient and Reliable Topology Control Algorithm for Ad-Hoc Networks, IEEE Transactions on Wireless Communications, vol. 8, no, 12, pp , Dec [24] N. Ansari, G. Cheng, and R. N. Krishnan, Efficient and reliable link state information dissemination, IEEE Communications Letters, vol. 8, no. 5, pp , May Yuichi Kawamoto received his B.E. in Information Engineering from Tohoku University, Japan, in Currently, he is pursuing M.S. degree in the Graduate School of Information Science (GSIS) at Tohoku University. He was awarded the Satellite Communications Research Award in the fiscal year of 2011 from the Institute of Electronics, Information and Communication Engineers (IEICE). He is recipient of Japan Society for the Promotion of Science (JSPS) in His research interests are in the areas of satellite networks and sensor networks. He is a student member of IEEE. Hiroki Nishiyama received his M.S. and Ph.D. in Information Science from Tohoku University, Japan, in 2007 and 2008, respectively. He was a Research Fellow of the prestigious Japan Society for the Promotion of Science (JSPS) until the completion of his PhD, following which he went on to become an Assistant Professor at the Graduate School of Information Sciences (GSIS) at Tohoku University. He was promoted to his current position of an Associate Professor at GSIS in 2012, when he was just 29 years old. He was acclaimed with the Best Paper Awards in many international conferences including IEEE s flagship events, namely the IEEE Wireless Communications and Networking Conference in 2012 (WCNC 12) and the IEEE Global Communications Conference in 2010 (GLOBECOM 10). He is a young yet already prominent researcher in his field as evident from his valuable contributions in terms of many quality publications in prestigious IEEE journals and conferences. He was also a recipient of the IEICE Communications Society Academic Encouragement Award 2011 and the 2009 FUNAI Foundation s Research Incentive Award for Information Technology. He received the Best Student Award and Excellent Research Award from Tohoku University for his phenomenal performance during the undergraduate and master course study, respectively. His research covers a wide range of areas including traffic engineering, congestion control, satellite communications, ad hoc and sensor networks, and network security. He is a member of the Institute of Electronics, Information and Communication Engineers (IEICE), and he is also an IEEE senior member.

10 Nei Kato (A 03-M 04-SM 05-F 13) received his Bachelor Degree from Polytechnic University, Japan in 1986, M.S. and Ph.D. Degrees in information engineering from Tohoku University, Japan, in 1988 and 1991, respectively. He joined Computer Center of Tohoku University at 1991, and has been a full professor with the Graduate School of Information Sciences since He became Special Assistant to the President of Tohoku University since He has been engaged in research on satellite communications, computer networking, wireless mobile communications, smart grid, image processing, and pattern recognition. He has published more than 300 papers in peer-reviewed journals and conference proceedings. He currently serves as the Vice Chair of IEEE Ad Hoc and Sensor Networks Technical Committee, the Chair of IEEE ComSoc Sendai Chapter, the steering committee member of WCNC and a voting member of GITC, an editor of IEEE Wireless Communications (2006-), IEEE Wireless Communications (2006-), IEEE Network Magazine (2012-), IEEE Transactions on Wireless Communications (2008-), IEEE Transactions on Vehicular Technology (2010-), and IEEE Trans. on Parallel and Distributed Systems (TPDS). From 2013, he also serves as an Associate Editor-in-Chief of TPDS. He has served as the Chair of IEEE Satellite and Space Communications Technical Committee ( ), the Chair of IEICE Satellite Communications Technical Committee ( ), guest-editor of many IEEE transactions/journals/magazines, a symposium co-chair of GLOBECOM 07, ICC 10, ICC 11, ICC 12, Vice Chair of IEEE WCNC 10, WCNC 11, China- Com 08, ChinaCom 09, Symposia co-chair of GLOBECOM 12, ICC 14, and workshop co-chair of VTC2010. His awards include Minoru Ishida Foundation Research Encouragement Prize (2003), Distinguished Contributions to Satellite Communications Award from the IEEE Communications Society, Satellite and Space Communications Technical Committee (2005), the FUNAI information Science Award (2007), the TELCOM System Technology Award from Foundation for Electrical Communications Diffusion (2008), the IEICE Network System Research Award (2009), the IEICE Satellite Communications Research Award (2011), the KDDI Foundation Excellent Research Award (2012), IEICE Communications Society Distinguished Service Award (2012), IEEE GLOBECOM Best Paper Award (twice), IEEE WCNC Best Paper Award, and IEICE Communications Society Best Paper Award (2012). Besides his academic activities, he also serves on the expert committee of Telecommunications Council, Ministry of Internal Affairs and Communications, and as the chairperson of ITU-R SG4 and SG7, Japan. Nei Kato is a Distinguished Lecturer of IEEE Communications Society ( ) and the co-pi of A3 Foresight Program ( ) funded by Japan Society for the Promotion of Sciences (JSPS), NSFC of China, and NRF of Korea. He is a fellow of IEEE and IEICE. 9

MA-LTRT : A Novel Method to Improve Network Connectivity and Power Consumption in Mobile Ad-hoc Based Cyber-Physical Systems

MA-LTRT : A Novel Method to Improve Network Connectivity and Power Consumption in Mobile Ad-hoc Based Cyber-Physical Systems Received 3 May 2013; revised 19 July 2013; accepted 23 July 2013. Date of publication 15 August 2013; date of current version 21 January 2014. Digital Object Identifier 10.1109/TETC.2013.2278707 MA-LTRT

More information

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

More information

Toward Terminal-to-Terminal Communication Networks: A Hybrid MANET and DTN Approach (Invited Paper)

Toward Terminal-to-Terminal Communication Networks: A Hybrid MANET and DTN Approach (Invited Paper) Toward Terminal-to-Terminal Communication Networks: A Hybrid MANET and DTN Approach (Invited Paper) 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all

More information

On Minimizing the Impact of Mobility on Topology Control in Mobile Ad Hoc Networks

On Minimizing the Impact of Mobility on Topology Control in Mobile Ad Hoc Networks On Minimizing the Impact of Mobility on Topology Control in Mobile Ad Hoc Networks 2012 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any

More information

1158 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 11, NO. 3, MARCH 2012

1158 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 11, NO. 3, MARCH 2012 1158 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 11, NO. 3, MARCH 212 On Minimizing the Impact of Mobility on Topology Control in Mobile Ad Hoc Networks Hiroki Nishiyama, Member, IEEE, Thuan Ngo,

More information

Call for Papers for Communication QoS, Reliability and Modeling Symposium

Call for Papers for Communication QoS, Reliability and Modeling Symposium Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end

More information

A Novel Communication Mode Selection Technique for DTN over MANET Architecture

A Novel Communication Mode Selection Technique for DTN over MANET Architecture A Novel Communication Mode Selection Technique for over Architecture 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future

More information

Reducing the Channel Switching Delay in IP-based Multi-channel Streaming

Reducing the Channel Switching Delay in IP-based Multi-channel Streaming Reducing the Channel Switching Delay in IP-based Multi-channel Streaming 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current

More information

A Partially Centralized Messaging Control Scheme Using Star Topology in Delay and Disruption Tolerant Networks

A Partially Centralized Messaging Control Scheme Using Star Topology in Delay and Disruption Tolerant Networks A Partially Centralized Messaging Control Scheme Using Star Topology in Delay and Disruption Tolerant Networks 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained

More information

Smart FiWi Networks: Challenges and Solutions for QoS and Green Communications

Smart FiWi Networks: Challenges and Solutions for QoS and Green Communications Smart FiWi Networks: Challenges and Solutions for QoS and Green Communications 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current

More information

Replication Control for Ensuring Reliability of Convergecast Message Delivery in Infrastructure-aided DTNs

Replication Control for Ensuring Reliability of Convergecast Message Delivery in Infrastructure-aided DTNs Replication Control for Ensuring Reliability of Convergecast Message Delivery in Infrastructure-aided DTNs 24 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for

More information

An Energy Efficient Upload Transmission Method in Storage-Embedded Wireless Mesh Networks

An Energy Efficient Upload Transmission Method in Storage-Embedded Wireless Mesh Networks An Energy Efficient Upload Transmission Method in Storage-Embedded Wireless Mesh Networks 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses,

More information

Toward Low Cost Workload Distribution for Integrated Green Data Centers

Toward Low Cost Workload Distribution for Integrated Green Data Centers Toward Low Cost Workload Distribution for Integrated Green Data Centers 215 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or

More information

AVALANCHE: A NETWORK CODING ANALYSIS

AVALANCHE: A NETWORK CODING ANALYSIS COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application

More information

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Masaru Yoshimachi and Yoshifumi Manabe movement of the devices. Thus the routing protocols for MANET need

More information

An Intelligent Routing Scheme Effectively Utilizing Mass Storage Embedded on Satellites to Mitigate Network Congestions

An Intelligent Routing Scheme Effectively Utilizing Mass Storage Embedded on Satellites to Mitigate Network Congestions An Intelligent Routing Scheme Effectively Utilizing Mass Storage Embedded on Satellites to Mitigate Network Congestions 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

Proposal of interference reduction routing for ad-hoc networks

Proposal of interference reduction routing for ad-hoc networks Proposal of interference reduction routing for ad-hoc networks Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering, Mie University, 577 Kurimamachiya, Tsu,

More information

Energy Optimized Routing Algorithm in Multi-sink Wireless Sensor Networks

Energy Optimized Routing Algorithm in Multi-sink Wireless Sensor Networks Appl. Math. Inf. Sci. 8, No. 1L, 349-354 (2014) 349 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/081l44 Energy Optimized Routing Algorithm in Multi-sink

More information

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks A Simple Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks Chun-Su Park, You-Sun Kim, Kwang-Wook Lee, Seung-Kyun Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Cooperative QoS Control Scheme based on Scheduling Information in FiWi Access Network

Cooperative QoS Control Scheme based on Scheduling Information in FiWi Access Network Cooperative QoS Control Scheme based on Scheduling Information in FiWi Access Network 213 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in

More information

Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks

Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks Harichandan Roy, Shuvo Kumar De, Md.Maniruzzaman, and Ashikur Rahman Department of Computer Science and Engineering Bangladesh University

More information

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Chapter 2 OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Hanan Luss and Wai Chen Telcordia Technologies, Piscataway, New Jersey 08854 hluss@telcordia.com, wchen@research.telcordia.com Abstract:

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Jina Han Department of Information and Computer Engineering Ajou University Suwon, South Korea hangn0808@ajou.ac.kr

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks Appl. Math. Inf. Sci. 6 No. 2S pp. 713S-719S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Reduce Identical Composite Event Transmission

More information

Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs

Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs Girish K 1 and Mrs. Shruthi G 2 1 Department of CSE, PG Student Karnataka, India 2 Department of CSE,

More information

Cooperative QoS Control Scheme Based on Scheduling Information in FiWi Access Network

Cooperative QoS Control Scheme Based on Scheduling Information in FiWi Access Network Received 9 April 2013; revised 26 July 2013; accepted 31 July 2013. Date of publication 22 August 2013; date of current version 21 January 2014. Digital Object Identifier 10.1109/TETC.2013.2278699 Cooperative

More information

A Fault-recovery Routing Approach for Loop-based Clustering WSN

A Fault-recovery Routing Approach for Loop-based Clustering WSN A Fault-recovery Routing Approach for Loop-based Clustering WSN Ming Xu 1, Shengdong Zhang 1, Jiannong Cao 2, Xiaoxing Guo 3 ( 1 School of Computer, National Univ. of Defense Technology, Changsha, China)

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

An Energy-Balanced Cooperative MAC Protocol in MANETs

An Energy-Balanced Cooperative MAC Protocol in MANETs 2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore An Energy-Balanced Cooperative MAC Protocol in MANETs

More information

Congestion Control in Mobile Ad-Hoc Networks

Congestion Control in Mobile Ad-Hoc Networks Congestion Control in Mobile Ad-Hoc Networks 1 Sandeep Rana, 2 Varun Pundir, 3 Ram Sewak Singh, 4 Deepak Yadav 1, 2, 3, 4 Shanti Institute of Technology, Meerut Email: sandeepmietcs@gmail.com Email: varunpundir@hotmail.com

More information

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network ISBN 978-93-84422-8-6 17th IIE International Conference on Computer, Electrical, Electronics and Communication Engineering (CEECE-217) Pattaya (Thailand) Dec. 28-29, 217 Relay Node Deployment for Assuring

More information

On the Optimal Transmission Distance for Power-aware Routing in Ad hoc Networks

On the Optimal Transmission Distance for Power-aware Routing in Ad hoc Networks On the Optimal Transmission Distance for Power-aware Routing in Ad hoc Networks 203 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current

More information

Fault-tolerant in wireless sensor networks using fuzzy logic

Fault-tolerant in wireless sensor networks using fuzzy logic International Research Journal of Applied and Basic Sciences 2014 Available online at www.irjabs.com ISSN 2251-838X / Vol, 8 (9): 1276-1282 Science Explorer Publications Fault-tolerant in wireless sensor

More information

/15/$ IEEE

/15/$ IEEE A Novel Design for Content Delivery over Software Defined Mobile Social Networks Zhou Su, Qichao Xu, Haojin Zhu, and Ying Wang Abstract With the rapid development of mobile communication technologies,

More information

Wireless Mesh Network Deployed in Disaster Area using Gateway Selection

Wireless Mesh Network Deployed in Disaster Area using Gateway Selection Wireless Mesh Network Deployed in Disaster Area using Gateway Selection Supriya M. Nasre supriya.nasre4@gmail.com Dept. of E&TC, D. Y. Patil Collegee of Engineering,Akurdi, Pune. P. Malathi malathijesudason@ymail.com

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

Diversity Coded 5G Fronthaul Wireless Networks

Diversity Coded 5G Fronthaul Wireless Networks IEEE Wireless Telecommunication Symposium (WTS) 2017 Diversity Coded 5G Fronthaul Wireless Networks Nabeel Sulieman, Kemal Davaslioglu, and Richard D. Gitlin Department of Electrical Engineering University

More information

Quality-Assured Energy Balancing for Multi-hop Wireless Multimedia Networks via 2-D Channel Coding Rate Allocation

Quality-Assured Energy Balancing for Multi-hop Wireless Multimedia Networks via 2-D Channel Coding Rate Allocation Quality-Assured Energy Balancing for Multi-hop Wireless Multimedia Networks via 2-D Channel Coding Rate Allocation Lin Xing, Wei Wang, Gensheng Zhang Electrical Engineering and Computer Science, South

More information

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

More information

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks , March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,

More information

Toward Energy Efficient Big Data Gathering in Densely Distributed Sensor Networks

Toward Energy Efficient Big Data Gathering in Densely Distributed Sensor Networks Received 15 November 2013; revised 25 February 2014; accepted 2 March 2014. Date of publication 16 April 2014; date of current version 30 October 2014. Digital Object Identifier 10.1109/TETC.2014.2318177

More information

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks 152 JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 2, APRIL 2011 The Improved WCMRP Protocol for Mobile Wireless Sensor Networks Ming Huang Guo Department of Information Management, Shih-Hsin University, Taipei,

More information

A Traffic Distribution Technique to Minimize Packet Delivery Delay in Multi-Layered Satellite Networks

A Traffic Distribution Technique to Minimize Packet Delivery Delay in Multi-Layered Satellite Networks A Traffic Distribution Technique to Minimize Packet Delivery Delay in Multi-Layered Satellite Networks 013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all

More information

Multi-path based Algorithms for Data Transfer in the Grid Environment

Multi-path based Algorithms for Data Transfer in the Grid Environment New Generation Computing, 28(2010)129-136 Ohmsha, Ltd. and Springer Multi-path based Algorithms for Data Transfer in the Grid Environment Muzhou XIONG 1,2, Dan CHEN 2,3, Hai JIN 1 and Song WU 1 1 School

More information

On Application Layer Multicast

On Application Layer Multicast On Application Layer Multicast 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing

More information

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

Improving Connectivity via Relays Deployment in Wireless Sensor Networks

Improving Connectivity via Relays Deployment in Wireless Sensor Networks Improving Connectivity via Relays Deployment in Wireless Sensor Networks Ahmed S. Ibrahim, Karim G. Seddik, and K. J. Ray Liu Department of Electrical and Computer Engineering, and Institute for Systems

More information

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Multi-path Forward Error Correction Control Scheme with Path Interleaving Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,

More information

CONTENT ADAPTIVE SCREEN IMAGE SCALING

CONTENT ADAPTIVE SCREEN IMAGE SCALING CONTENT ADAPTIVE SCREEN IMAGE SCALING Yao Zhai (*), Qifei Wang, Yan Lu, Shipeng Li University of Science and Technology of China, Hefei, Anhui, 37, China Microsoft Research, Beijing, 8, China ABSTRACT

More information

Power Control Performance Evaluation for Efficiency in D2D Cellular Network

Power Control Performance Evaluation for Efficiency in D2D Cellular Network Power Control Performance Evaluation for Efficiency in D2D Cellular Network Soo Hyeong Kang, Jeong Gon Kim* Department of Electronic Engineering, Korea Polytechnic University, Siheung Si, Gyeonggi Do,

More information

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision Huei-Wen Ferng, Jin-Hui Lin, Yuan-Cheng Lai, and Yung-Ching Chen Department of Computer Science and Information

More information

A Study on Certificate Revocation in Mobile Ad Hoc Networks

A Study on Certificate Revocation in Mobile Ad Hoc Networks A Study on Certificate Revocation in Mobile Ad Hoc Networks 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

More information

Recover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet

Recover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet Recover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet Midori Terasawa, Masahiro Nishida, Sho Shimizu, Yutaka Arakawa, Satoru Okamoto and Naoaki Yamanaka Department

More information

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Enhanced Parity Packet Transmission for Video Multicast using R-DSTC Özgü Alay, Zhili Guo, Yao Wang, Elza Erkip

More information

Call for Papers for Communication Theory Symposium

Call for Papers for Communication Theory Symposium Call for Papers for Communication Theory Symposium Scope and Motivation: The Communication Theory Symposium covers all aspects related to communication theory, with a focus on topics related to fundamental

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Efficient Message Caching Scheme for MANET

Efficient Message Caching Scheme for MANET Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of

More information

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake Mobile Information Systems 5 (009) 3 DOI 0.333/MIS-009-0070 IOS Press A new MAC protocol for reducing effect of needless transmission deferment induced by missed / handshake Tetsuya Shigeyasu a, Daishi

More information

Broadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks

Broadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks Broadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks M.N. Mariyasagayam, M. Lenardi HITACHI Europe, "Le Thélème", 1503 Route des Dolines, 06560 Sophia Antipolis, France Phone:

More information

Multi-Method Data Delivery for Green Sensor-Cloud

Multi-Method Data Delivery for Green Sensor-Cloud Green Communications and Computing Multi-Method Data Delivery for Green Sensor-Cloud Chunsheng Zhu, Victor C. M. Leung, Kun Wang, Laurence T. Yang, and Yan Zhang The authors discuss the potential applications

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

A Minimum-energy Path-preserving Topology Control Algorithm for Wireless Sensor Networks

A Minimum-energy Path-preserving Topology Control Algorithm for Wireless Sensor Networks International Journal of Automation and Computing 6(3), August 2009, 295-300 DOI: 10.1007/s11633-009-0295-0 A Minimum-energy Path-preserving Topology Control Algorithm for Wireless Sensor Networks Jin-Zhao

More information

Algorithms for minimum m-connected k-tuple dominating set problem

Algorithms for minimum m-connected k-tuple dominating set problem Theoretical Computer Science 381 (2007) 241 247 www.elsevier.com/locate/tcs Algorithms for minimum m-connected k-tuple dominating set problem Weiping Shang a,c,, Pengjun Wan b, Frances Yao c, Xiaodong

More information

Cost Based Efficient Routing for Wireless Body Area Networks

Cost Based Efficient Routing for Wireless Body Area Networks Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 8, August 2015,

More information

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks

Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks Mihaela Cardei, Jie Wu, and Shuhui Yang Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 {mihaela,jie}@cse.fau.edu,

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS http:// CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS M.Sengaliappan 1, K.Kumaravel 2, Dr. A.Marimuthu 3 1 Ph.D( Scholar), Govt. Arts College, Coimbatore, Tamil Nadu, India 2 Ph.D(Scholar), Govt.,

More information

A CORDIC Algorithm with Improved Rotation Strategy for Embedded Applications

A CORDIC Algorithm with Improved Rotation Strategy for Embedded Applications A CORDIC Algorithm with Improved Rotation Strategy for Embedded Applications Kui-Ting Chen Research Center of Information, Production and Systems, Waseda University, Fukuoka, Japan Email: nore@aoni.waseda.jp

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,

More information

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE 802.16j Networks Shimpei Tanaka Graduate School of Information Science and Technology Osaka University, Japan sinpei-t@ist.osaka-u.ac.jp

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

Keynote Speakers CyberC 2010

Keynote Speakers CyberC 2010 Keynote Speakers CyberC 2010 Keynote Speaker 1 Wireless Sensor Network Security: Overview and Future Perspective Prof. Anup Kumar University of Louisville, USA Wireless sensor networks have the potential

More information

Partial Caching Scheme for Streaming Multimedia Data in Ad-hoc Network

Partial Caching Scheme for Streaming Multimedia Data in Ad-hoc Network , pp.106-110 http://dx.doi.org/10.14257/astl.2014.51.25 Partial Caching Scheme for Streaming Multimedia Data in Ad-hoc Network Backhyun Kim and Iksoo Kim 1 Faculty of Liberal Education, Incheon National

More information

EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks

EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks M.Sudha 1, J.Sundararajan 2, M.Maheswari 3 Assistant Professor, ECE, Paavai Engineering College, Namakkal, Tamilnadu, India 1 Principal,

More information

SENSE AND CACHE A NOVEL CACHING SCHEME FOR MOBILE USERS IN A CELLULAR NETWORK

SENSE AND CACHE A NOVEL CACHING SCHEME FOR MOBILE USERS IN A CELLULAR NETWORK SENSE AND CACHE A NOVEL CACHING SCHEME FOR MOBILE USERS IN A CELLULAR NETWORK C.MALA 1, S.SELVAKUMAR 2 Department of Computer science and Engineering National Institute of technology, Tiruchirappalli,

More information

Project Participants

Project Participants Annual Report for Period:10/2004-10/2005 Submitted on: 06/21/2005 Principal Investigator: Yang, Li. Award ID: 0414857 Organization: Western Michigan Univ Title: Projection and Interactive Exploration of

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications 1 S.Shahinsha, 2 Mr.M.Sri Raghavendra 1 PG Scholar, St. Johns College of Engineering &Technology, Yerakota, AP, India 2 Assistant

More information

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE) An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks Poonam kori, Dr. Sanjeev Sharma School Of Information Technology, RGPV BHOPAL, INDIA E-mail: Poonam.kori@gmail.com Abstract - Routing

More information

Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model

Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model HIROMICHI SUGIYAMA YUKINOBU FUKUSHIMA TOKUMI YOKOHIRA The Graduate School of Natural Science

More information